ASR_BASE
Change-Id: Icf3719cc0afe3eeb3edc7fa80a2eb5199ca9dda1
diff --git a/external/subpack/net/openconnect/files/openconnect.sh b/external/subpack/net/openconnect/files/openconnect.sh
new file mode 100755
index 0000000..37f1945
--- /dev/null
+++ b/external/subpack/net/openconnect/files/openconnect.sh
@@ -0,0 +1,153 @@
+#!/bin/sh
+. /lib/functions.sh
+. ../netifd-proto.sh
+init_proto "$@"
+
+append_args() {
+ while [ $# -gt 0 ]; do
+ append cmdline "'${1//\'/\'\\\'\'}'"
+ shift
+ done
+}
+
+proto_openconnect_init_config() {
+ proto_config_add_string "server"
+ proto_config_add_int "port"
+ proto_config_add_int "mtu"
+ proto_config_add_int "juniper"
+ proto_config_add_string "vpn_protocol"
+ proto_config_add_boolean "no_dtls"
+ proto_config_add_string "interface"
+ proto_config_add_string "username"
+ proto_config_add_string "serverhash"
+ proto_config_add_string "authgroup"
+ proto_config_add_string "usergroup"
+ proto_config_add_string "password"
+ proto_config_add_string "password2"
+ proto_config_add_string "token_mode"
+ proto_config_add_string "token_secret"
+ proto_config_add_string "token_script"
+ proto_config_add_string "os"
+ proto_config_add_string "csd_wrapper"
+ proto_config_add_array 'form_entry:regex("[^:]+:[^=]+=.*")'
+ no_device=1
+ available=1
+}
+
+proto_openconnect_add_form_entry() {
+ [ -n "$1" ] && append_args --form-entry "$1"
+}
+
+proto_openconnect_setup() {
+ local config="$1"
+
+ json_get_vars \
+ authgroup \
+ csd_wrapper \
+ form_entry \
+ interface \
+ juniper \
+ vpn_protocol \
+ mtu \
+ no_dtls \
+ os \
+ password \
+ password2 \
+ port \
+ server \
+ serverhash \
+ token_mode \
+ token_script \
+ token_secret \
+ usergroup \
+ username \
+
+ grep -q tun /proc/modules || insmod tun
+ ifname="vpn-$config"
+
+ logger -t openconnect "initializing..."
+
+ logger -t "openconnect" "adding host dependency for $server at $config"
+ for ip in $(resolveip -t 10 "$server"); do
+ logger -t "openconnect" "adding host dependency for $ip at $config"
+ proto_add_host_dependency "$config" "$ip" "$interface"
+ done
+
+ [ -n "$port" ] && port=":$port"
+
+ append_args "$server$port" -i "$ifname" --non-inter --syslog --script /lib/netifd/vpnc-script
+ [ "$no_dtls" = 1 ] && append_args --no-dtls
+ [ -n "$mtu" ] && append_args --mtu "$mtu"
+
+ # migrate to standard config files
+ [ -f "/etc/config/openconnect-user-cert-vpn-$config.pem" ] && mv "/etc/config/openconnect-user-cert-vpn-$config.pem" "/etc/openconnect/user-cert-vpn-$config.pem"
+ [ -f "/etc/config/openconnect-user-key-vpn-$config.pem" ] && mv "/etc/config/openconnect-user-key-vpn-$config.pem" "/etc/openconnect/user-key-vpn-$config.pem"
+ [ -f "/etc/config/openconnect-ca-vpn-$config.pem" ] && mv "/etc/config/openconnect-ca-vpn-$config.pem" "/etc/openconnect/ca-vpn-$config.pem"
+
+ [ -f /etc/openconnect/user-cert-vpn-$config.pem ] && append_args -c "/etc/openconnect/user-cert-vpn-$config.pem"
+ [ -f /etc/openconnect/user-key-vpn-$config.pem ] && append_args --sslkey "/etc/openconnect/user-key-vpn-$config.pem"
+ [ -f /etc/openconnect/ca-vpn-$config.pem ] && {
+ append_args --cafile "/etc/openconnect/ca-vpn-$config.pem"
+ append_args --no-system-trust
+ }
+
+ if [ "${juniper:-0}" -gt 0 ]; then
+ append_args --juniper
+ fi
+
+ [ -n "$vpn_protocol" ] && {
+ append_args --protocol "$vpn_protocol"
+ }
+
+ [ -n "$serverhash" ] && {
+ append_args "--servercert=$serverhash"
+ append_args --no-system-trust
+ }
+ [ -n "$authgroup" ] && append_args --authgroup "$authgroup"
+ [ -n "$usergroup" ] && append_args --usergroup "$usergroup"
+ [ -n "$username" ] && append_args -u "$username"
+ [ -n "$password" ] || [ "$token_mode" = "script" ] && {
+ umask 077
+ mkdir -p /var/etc
+ pwfile="/var/etc/openconnect-$config.passwd"
+ [ -n "$password" ] && {
+ echo "$password" > "$pwfile"
+ [ -n "$password2" ] && echo "$password2" >> "$pwfile"
+ }
+ [ "$token_mode" = "script" ] && {
+ $token_script >> "$pwfile" 2> /dev/null || {
+ logger -t openconenct "Cannot get password from script '$token_script'"
+ proto_setup_failed "$config"
+ }
+ }
+ append_args --passwd-on-stdin
+ }
+
+ [ -n "$token_mode" -a "$token_mode" != "script" ] && append_args "--token-mode=$token_mode"
+ [ -n "$token_secret" ] && append_args "--token-secret=$token_secret"
+ [ -n "$os" ] && append_args "--os=$os"
+ [ -n "$csd_wrapper" ] && [ -x "$csd_wrapper" ] && append_args "--csd-wrapper=$csd_wrapper"
+
+ json_for_each_item proto_openconnect_add_form_entry form_entry
+
+ proto_export INTERFACE="$config"
+ logger -t openconnect "executing 'openconnect $cmdline'"
+
+ if [ -f "$pwfile" ]; then
+ eval "proto_run_command '$config' /usr/sbin/openconnect-wrapper '$pwfile' $cmdline"
+ else
+ eval "proto_run_command '$config' /usr/sbin/openconnect $cmdline"
+ fi
+}
+
+proto_openconnect_teardown() {
+ local config="$1"
+
+ pwfile="/var/etc/openconnect-$config.passwd"
+
+ rm -f $pwfile
+ logger -t openconnect "bringing down openconnect"
+ proto_kill_command "$config" 2
+}
+
+add_protocol openconnect